a) Access any information composed, created, received, downloaded, retrieved, stored, or sent using department computers.
|
|
- Jasmin Alice Richardson
- 8 years ago
- Views:
Transcription
1 CAYUGA COUNTY POLICY MANUAL Section 11 Subject: Electronic messaging and internet 1 Effective Date: 5/25/10; Res Supersedes Policy of: November 28, 2000 Name of Policy: County Computer Hardware-Software I. BACKGROUND: The availability and use of computers in the county has provided many opportunities for the enhancement of productivity. While increased access to information has benefited the county, technology that entails easy access to and the rapid transfer and distribution of sensitive data has the potential to have a damaging effect on the county, our employees, and the public, if not managed properly. II. PURPOSE: The purpose of this order is to establish policy and procedures regarding the use of county computer and electronic messaging systems. Ill. POLICY: It is the policy of Cayuga County that all employees shall abide by the guidelines established for the use of department computers to include applicable department rules and regulations, other department written directives, interface provider regulations, directives, operating instructions, use and dissemination agreements, and all applicable federal and state statutes. IV. DEFINITIONS: DEPARTMENT COMPUTER: Any personal computer, laptop computer, hand-held computer device, wireless computer device, or similar device owned, leased, operated, or maintained by the County of Cayuga. AUTHORIZED USER: Any employee authorized by appropriate authority to utilize County computer(s). TECHNOLOGY OFFICER: The member of this county designated by the County Administrator with the responsibility for managing computers. INFORMATION TECHNOLOGY STAFF: IT Personnel employed by the Cayuga County Information Technology Department or Health and Human Services IT Personnel, or Data Processing Personnel and assigned to technology and network management. UNAUTHORIZED SOFTWARE: Any software that has not been approved by the Information Technology Staff and licensed for use on department computers. This includes any software not required for job related duties. DOWNLOADS: Copies of computer files obtained through removable media (e.g., floppy disk, zip disk, CD ROM) or received from another computer or the internet. 1 This policy does not superceed or impact on General Order No. 452 Computers and Electronic messages issued by Sheriff Dave Gould, effective March 2010; or any amendments to General Order No P age
2 V. PROCEDURE: A. GENERAL USE AND PRIVACY 1. The use of any department computer is authorized for official business only and is considered a privilege subject to revocation. 2. Employees do not maintain any right to privacy when using a department computer and its contents, to include personally owned software. By using a department computer, all employees knowingly and voluntarily consent to electronic monitoring and acknowledge the department's right to conduct such monitoring. The County Administrator reserves the right, without notice, to: a) Access any information composed, created, received, downloaded, retrieved, stored, or sent using department computers. b) Access, for quality control, audit, or internal affairs purposes, any electronic messages generated by members utilizing department computers. c) Require employees to provide passwords to systems or files that have been password protected or encrypted. 3. Accessing or transmitting materials other than for official business that involves indecent, sexually explicit, and/or unprofessional language or images, or that disparages any person, group, or classification of individuals is prohibited. 4. Installation of and access to software of a purely entertainment use (e.g., computer games) is prohibited. B. SECURITY AND CONFIDENTIALITY 1. The use of department computers shall be limited to legitimate County purposes and department communications. 2. All information stored within or accessible by department computers shall be treated as confidential information. This information may only be accessed, disclosed or disposed of in accordance with: 2 P age a) Department policy and procedures, b) The policy, rules, regulations or operating instructions of information provider agencies c) Use and dissemination agreements of information provider agencies. d) Applicable federal and state laws. 3. Only authorized users may use County, department, or State computers. Employees assigned to use a computer will be responsible for maintaining its physical security as well as the integrity and security of data contained therein. Every reasonable precaution available shall be used to safeguard the computer/data (e.g., logging-off terminals when leaving a computer unattended, shielding screens from public view, maintaining password confidentiality). 4. No employee will access or attempt to gain access or allow an unauthorized person to gain access to any computer or any area of a County, department, or State computer or network that he/she is not authorized to access. This includes, but is not limited to, hard drives, network drives, interfaces, removable media,
3 software programs, databases, and mailboxes. 5. Employees viewing any information in County, department, or State computers are responsible for the security and confidentiality of that information. Information and reports viewed in electronic form are considered the same as printed material. All applicable policies and procedures, regulations, use and dissemination agreements, and laws governing the release and disposition of computer information shall be followed. Confidential printed information should be shredded. 6. Confidential, proprietary, or sensitive information may be disseminated only to authorized persons with a need and a right to know and only when there is sufficient assurance that the appropriate security of such information will be maintained. Examples of such information include, but are not limited to: a) Client records including medical records, income/credit information, and identification data. b) Personnel information such as personnel complaints, performance reviews, internal investigations, grievances, disciplinary information, personal employee information, and medical records. c) Internal department memorandums or communications. d) Criminal history information and any other files protected by law (e.g., juvenile delinquency records). e) Confidential informant, intelligence, and identification files. 7. Employees are required to immediately report any potential, suspected, or known breach of department computer security to the County Administrator. C. I. COMPUTER HARDWARE/SOFTWARE POLICY 1. All new computers purchased must have surge protection on electric power, either surge suppressor, or UPS with surge suppressor. 2. Any new computer hardware may not be installed without informing the County Administrator or his/her designee. 3. Computer equipment may not be relocated or reassigned outside the department or between buildings without informing the County Administrator or his/her designee. 4. Internal computer hardware equipment (such as network cards, video cards, hard disks, etc.) may not be moved from one PC to another without authorization from the County Administrator or his/her designee. 5. Computer equipment may not be removed from County property without authorization from the County Administrator or his/her designee (except laptops and notebooks). Employees taking any computer equipment away from County premises (including laptops or notebooks) must have permission from their department head. Any computer equipment taken off County premises may only be used for County related work. 6. All work station PC s are to be shut down at the end of the day, especially during the summer, for protection against power surges from lightning storms, unless remote or network access is necessary after normal business hours. 7. Purchase of Hardware or Services: 3 P age (a) The County Administrator or his/her designee must approve any lease or contract for professional services that relates to computer hardware. This includes design, support or maintenance of computer hardware, networking, Internet, and computer repair services. All hardware purchases must also conform to the County Procurement Policy and guidelines.
4 8. Only licensed versions of application software and/or operating system software are permitted. Bootleg or pirated software is not permitted on county-owned computers at any time. Software not approved by the County Administrator or his/her designee is not permitted on county-owned computers at any time. 9. Duplication of county-owned software through any medium (e.g., CD-Rom writer, diskettes) for personal use or unauthorized distribution is prohibited. 10. Installation and/or use of personal software from home on county-owned computers are prohibited. 11. Adding new screen-savers or inappropriate background screen image on county-owned computers is prohibited. 12. Do not change system settings (Network, Neighborhood, Device Setup, Internet Access Options, Control Panel Regional Settings, etc.) without authorization from County Administrator or his/her designee, except for printers properties. 13. Purchase of New Software and Services: (a) The County Administrator or his/her designee must review and authorize the purchase of any new software for any county-owned computer. (b) County Administrator or his/her designee must approve any lease or contract for professional services that relates to computer software. This includes design, support or maintenance of computer software, operating systems, databases, networking, and web design services. (c) All software purchases must also conform to the County Procurement Policy and guidelines. 14. County Administrator or his/her designee will select and set the types of general-purpose software for use throughout the County government. 15. Confirming sender before opening attachment is recommended. II. DATA INTEGRITY & SECURITY 16. It is the responsibility of all county employees to back up their data stored on their PC on a regular basis. Failure to do so may result in grave consequences for which the County Administrator or his/her designee will assume no responsibility. 17. A current copy of an Anti-Virus software approved by the County Administrator or his/her designee is to be running on each PC and laptop, and is not to be turned off or have its settings changed. 18. CD-ROMs, diskettes, and other media from outside sources are not to be used unless they directly relate to County business and have been checked for viruses. 19. Employees who feel any computer equipment, removable media or devices have been lost or stolen must report loss to the County Administrator immediately. 20. Employees who think their usernames or passwords may have been compromised must report the details to their IT support staff immediately. III. REMOVABLE MEDIA 21. Employees are not permitted to bring anything from outside to connect to a work PC or the County network. This includes the use of floppy disks, CD's. DVD's, thumb drives, external drives of any type, using any type of wireless protocol or devices, web cameras, music players, or any other type of media or storage device. 22. Employees are not permitted to copy, share, or remove County data or software from County property through the use of floppy disks, CDs or DVDs, thumb drives, , FTP transfer, cell phones, or any 4 P age
5 other type of storage device or transfer protocol or software unless it is directly related to and part of their job duties. 23. Employees are not permitted to view, copy, share, disseminate, or remove any client data, records of any kind, or any other type of data or information on County computers, network drives, servers, storage arrays, or any other type of electronic equipment unless it is directly related to and part of their job duties. 24. Employees are not permitted to modify any client data, records of any kind, or any other type of data or information on County computers,, network drives, servers, storage arrays, or any other type of electronic equipment unless it is directly related to and part of their job duties. D. TRAINING AND CERTIFICATION All authorized users shall receive appropriate training regarding the department computer systems they are authorized to use. E. PASSWORDS 1. Access to department computers and networks shall be password controlled. 2. Passwords shall be selected so as they are not easily guessed. Whenever practical, they shall include a combination of letters, numbers, and symbols. 3. It is strongly recommended that passwords should be changed at least once per year. 4. Employees shall not give their passwords on any discernable form (written or verbal) to anyone else except as provided in this directive (e.g., directed by command or computer support personnel for business or maintenance purposes). Written passwords or access codes shall not be left in or near computers. 5. Employees shall not use any password other than their own. 6. Password holders will be held accountable for computer access gained through use of their assigned password. 7. Employees who think their usernames or passwords may have been compromised must report the details to the County Administrator and IT support staff immediately. 8. No employee shall permit an unauthorized person to use the department's computer system. 9. If an employee leaves the department's employment, suspended from duty, absent for a prolonged period of time, or is no longer authorized to access any component of the department's computer system, his supervisor shall notify the County Administrator, who shall direct deactivation of the appropriate password account(s). F. SYSTEM ADMINISTRATION 1. The Information Technology Staff is responsible for the installation, maintenance, support, repair, operation, and security of all department computers. 2. Requests for maintenance, support, or repair shall be directed to the Information Technology Department. 3. Employees may not add or modify hardware or software to department computers, or adjust hardware settings (to include computer systems, printers, scanners, modems, and monitors) unless specifically authorized by the Information Technology Department. In addition, employees are prohibited from: a) Taking apart or removing external cases. b) Altering system files. c) Uninstalling, removing, or altering agency owned programs. d) Removing system batteries. 5 P age e) Swapping system parts.
6 4. No unauthorized software may be installed on department or County computers. 5. Employees shall observe the copyright and licensing restrictions of all software, documents, images, or sound and only licensed software may be installed on department or County owned computers. Any software for which proof of licensing (i.e., original disks, original manuals, and/or license) cannot be provided is subject to removal by authorized agency personnel. 6. System users shall take the necessary anti-virus precautions before accessing any external media or downloading or copying any file from the Internet. All media and download files are to be checked for viruses; all compressed files are to be checked before and after decompressed. Suspected viruses shall be isolated and reported to the Information Technology Department. 7. Employees shall be responsible for the basic care, maintenance, and operation of department computers to include: a) Following proper power-up and shut down protocol. b) Preventing exposure to food, liquid, or other damaging elements. c) Preventing damage or mistreatment. d) Removing any floppy disk, CD-ROM, or tape that may potentially damage the system. e) Updating and maintaining the integrity of system passwords. f) Following applicable instructions and procedures. g) Notifying the Information Technology Department of any malfunctions or other system anomalies. 8. To avoid breach of security, employees shall log off any department computer or any other computer that has access to the department's computer system whenever they leave their workstation. G. SYSTEM PROTECTION, DATA BACK-UP AND STORAGE, AND AUDIT 1. The Information Technology Department is responsible for the administering the County s anti-virus and system protection program to include: a) Loading and maintaining virus and firewall protection on all department owned personal computers and network drives. b) Timely update of virus definition files. c) Disseminating information regarding the use of utilities which safeguard department computers (e.g., virus scan, firewall software, file backup). d) Isolating detected viruses and system intrusions and minimizing damage. e) Recovery efforts following attacks. 2. The Information Technology Department shall be responsible for establishing and ensuring back-up procedures and for the regular backup of data stored on the County s Network servers. System users are responsible for any data not stored on a network drive. Storage and retention will be in an appropriate and secure manner and where applicable be in compliance with the NYS Records Retention and Disposition Schedule (CO-2). 6 P age
7 H. The following policy shall apply to all users of Official Cayuga County Addresses. An Official Cayuga County Address is or or 1. addresses shall be administered by the Cayuga County Webmaster. Requests for new accounts should be submitted to Information Technologies in writing using the appropriate request form. 2. An Official Cayuga County Address is intended only for official county business and all mail becomes property of Cayuga County. You are expected to keep personal correspondence to a minimum. 3. Using Official Cayuga County for any personal economic gain is not permitted. 3. Users are expected to check their accounts frequently and make provisions to have mail forwarded if they expect to be away for an extended period of time. I. ELECTRONIC MESSAGING 1. Electronic messaging through department owned computers is designed to enhance our efficiency. The use of electronic messaging shall be limited to legitimate County needs and department communications. 2. All messaging that is composed, transmitted, or received via our computer systems is considered to be part of the official records of the department and, as such, is subject to disclosure to other third parties. Consequently, members shall always ensure that information contained in messaging is accurate, appropriate, ethical, and lawful. 3. The following types of electronic messages are specifically prohibited: a) Sending or posting confidential or sensitive to those not authorized to receive it. b) Sending or posting material that could damage the department's image or reputation. c) Distributing copyrighted materials without the consent of the copyright owner. d) Sending or receiving messages for personal gain or non-department business. e) Sending or posting material that is discriminatory, harassing, or obscene, or for any other purpose that is illegal, against department policy, or not in the best interest of the department. f) Misrepresenting your identity (unless in the performance of an approved duty). g) Any activity that tends to clog the system to include sending or forwarding chain letters, unnecessarily sending messages to a large number of recipients, unnecessarily large attachments, or using excessive storage space on servers. h) Use of the Internet for downloading or uploading streaming audio, radio, video, Internet games or any other type of software, unless specifically related to county work. 7 P age i) Prohibited is viewing or posting messages, replies or any type of announcements to the Internet via message boards, forums, chat rooms, on-line classified, news groups, list
8 serves, or any other type of public web site, unless directly related to employees scope of work and not conflicting with any other communications policy set by the County Chairman or the County Legislature. j) Violation of this Internet policy could result in an employment sanction. 4. In order to limit the resources needed to store electronic messages, the County reserves the right to delete stored messages. Information that needs to be saved should be printed and filed in the appropriate place. J. INTERNET ACCESS 1. The County may at its discretion provide employees with Internet access to and/or information on the World Wide Web or similar data collection technology. Access is provided for department business use only. 2. Internet access shall be done in a professional manner in compliance with all applicable laws and department policies, and as authorized by the employee s Department Head or supervisor. The Internet shall not be used for any illegal, improper, unprofessional, illicit, or non-official business. 3. The Internet is a valuable tool and members may use the Internet in the performance of their duties to enhance their effectiveness. Users should not be "surfing the net" during work hours. 4. Transmission of confidential and sensitive information via the Internet is prohibited. 5. All files downloaded from the Internet shall be downloaded to the user's local hard drive (C:\) and scanned for viruses prior to being opened on any department computer. No files should be copied to any network drive unless the files have been scanned for viruses. 6. As with all department computer use, the County reserves the right to access and review Internet use on County computers as necessary to ensure that there is no misuse or violation of County policy or any law. The Technology Officer, County Administrator or his/her designee will monitor Internet activity and shall report abuse to the department head or other authority as deemed necessary. 8 P age
The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3
Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use
More informationPierce County Policy on Computer Use and Information Systems
Pierce County Policy on Computer Use and Information Systems Pierce County provides a variety of information technology resources such as computers, software, printers, scanners, copiers, electronic mail
More informationAPPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
More information13. Acceptable Use Policy
To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information
More informationTechnology Department 1350 Main Street Cambria, CA 93428
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
More informationInformation Technology Security Policies
Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral
More informationMISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
More informationHuman Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
More informationPRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800
PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800 ADMINISTRATIVE POLICY NO. 511 IMPLEMENTATION JANUARY 2014 EMPLOYEE ACCEPTABLE USE POLICY
More informationInformation Security and Electronic Communications Acceptable Use Policy (AUP)
Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern
More informationCity of Venice Information Technology Usage Policy
City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources
More informationPolicy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy
Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy This policy is for internal use only and does not enlarge an employee s civil liability in any way. The policy
More informationEMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet
More informationState of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE IT RESOURCES POLICY
State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE IT RESOURCES POLICY Effective December 15, 2008 State of Illinois Department of Central Management Services Bureau
More informationLINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy
LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet
More informationUse of ESF Computing and Network Resources
Use of ESF Computing and Network Resources Introduction: The electronic resources of the State University of New York College of Environmental Science and Forestry (ESF) are powerful tools, shared among
More informationNetwork and Workstation Acceptable Use Policy
CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of
More informationDepartment of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007
Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007 I. Statement of Policy The Department of Finance and Administration (DFA) makes
More informationInformation Technology Acceptable Use Policies and Procedures
Information Technology Acceptable Use Policies and Procedures The following Information Technology Acceptable Use Policies and Procedures are to be followed by ALL employees, contractors, vendors, and
More informationColumbus Police Division Directive. I. Definitions. May 15, 1993 10.01 REVISED. Division Computer Systems
Columbus Police Division Directive EFFECTIVE NUMBER May 15, 1993 10.01 REVISED TOTAL PAGES Mar. 30, 2014 9 Division Computer Systems I. Definitions A. Executable File A program or file that automatically
More informationWise County Computer Operations Policy
Wise County Computer Operations Policy Purpose The purpose of this policy is to implement guidelines and policies for the use of the Wise County computer systems and networks and external connections,
More informationCity of Grand Rapids ADMINISTRATIVE POLICY
City of Grand Rapids ADMINISTRATIVE POLICY NUMBER: 84-02 DATE: 7/23/84 REVISIONS: 6/17/88; 11/7/00 (replaces old #84-02, #95-07, & #95-08); 6/13/08; 11/26/13 ISSUED BY: City Manager SIGNED: SUBJECT: ELECTRONIC
More informationORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure
ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure MANUAL: Hospital Wide SECTION: Information Technology SUBJECT: Acceptable Use of Information Systems Policy IMPLEMENTATION: 01/2011 CONCURRENCE:
More informationData Protection Division Guidance Note Number 10/08
Gibraltar Regulatory Authority Data Protection Division Data Protection Division Data Protection Division Guidance Note Number 10/08 Monitoring of Staff Guidance Note Number 10/08 Issue Date: 06/11/2008
More informationCOLLINS CONSULTING, Inc.
COLLINS CONSULTING, Inc. TECHNOLOGY PLATFORM USE POLICY 53-R1 COLLINS CONSULTING, INC. TECHNOLOGY PLATFORM USE POLICY Confidential Collins Consulting, Inc. maintains, as part of its technology platform,
More informationSUNY College at Oneonta Information Technology Acceptable Use Policy
Policy Statement The College s Information Technology resources are intended for the exclusive use of people having a relationship with the College who have been assigned a valid user account. College
More informationMedford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
More informationINFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL 1 INTRODUCTION The County of Imperial Information & Technical Services (ITS) Security Policy is the foundation of the County's electronic information
More informationInformation Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
More informationUNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources
PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and
More informationIntroduction. General Use
Introduction Dane County provides a variety of technological resources to its employees to improve public service and maximize efficiency. The purpose of this policy is to advise users regarding the use
More informationAuthorised Acceptable Use Policy 2015-2016. Groby Community College Achieving Excellence Together
Groby Community College Achieving Excellence Together Authorised Acceptable Use Policy 2015-2016 Reviewed: Lee Shellard, ICT Manager: May 2015 Agreed: Leadership & Management Committee: May 2015 Next review:
More informationOXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the
More informationTECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320
TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320 The Edgecombe County Board of Education (the Board ) provides its students and staff access to a variety of technological resources. These resources
More informationAPPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES
APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS (INCLUDING INTERNET & E-MAIL) EMC CORPORATE POLICY COPYRIGHT 2007 EMC CORPORATION. ALL RIGHTS RESERVED. NO PORTION OF THIS MATERIAL MAY BE REPRODUCED,
More informationELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY
ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY 1 CONTENTS: 1. INTRODUCTION 2. APPLICABILITY 3. MANAGEMENT RIGHT TO ACCESS INFORMATION 4. PERSONAL USE OF E-MAIL & INTERNET FACILITIES 5. FORBIDDEN CONTENT
More informationMEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information
More information2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
More informationResponsible Access and Use of Information Technology Resources and Services Policy
Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong
More informationPINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM
PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is
More informationPHI- Protected Health Information
HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson
More informationOrganizational Policy
Approved by: City Manager/General Managers Report No.: n/a Effective: January 1, 2004 Reviewed: July 25, 2012 Amended: July 25, 2012 Next Review: July 25, 2013 Note: Purpose: on The purpose of this policy
More informationInformation Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
More informationAbout this Tool Information Security for Residents...
About this Tool Information Security for Residents... Purpose: Provide materials to inform and educate Residents in order to reach compliance regarding information security. Audience: New Residents Information
More informationCOMPUTER USE POLICY City of Proctor
COMPUTER USE POLICY City of Proctor Purpose This policy serves to protect the security and integrity of the city s electronic communication and information systems by educating employees about appropriate
More informationSubject: Computers & Electronic Records. Responsible Party: Part C Coordinator
POLICIES AND PROCEDURES NEW JERSEY EARLY INTERVENTION SYSTEM No: NJEIS-17 Subject: Computers & Electronic Records Effective Date: May 1, 2011 Responsible Party: Part C Coordinator I. Purpose To protect
More informationINTERNET ACCEPTABLE USE POLICY
INTERNET ACCEPTABLE USE POLICY 1 Introduction..3 Background..3 Objectives of this Policy...3 Application of this Policy..4 References and Related Legislation and Regulations..4 Policy Statement.4 Methods
More informationDIOCESE OF DALLAS. Computer Internet Policy
DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used
More informationArkansas Department of Community Correction
Service with Excellence & Integrity Arkansas Department of Community Correction Two Union National Plaza Building 105 West Capitol, 2 nd Floor Little Rock, Arkansas 72201-5731 (501) 682-9510 Fax: (501)
More informationSOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy
More informationCOMPUTER USE POLICY. 1.0 Purpose and Summary
COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive
More informationMARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS
MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated
More informationSUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE
Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing
More informationAPPROVED BY: Signatures on File Chief Information Officer APPROVED BY: Chief Financial Officer PURPOSE
TITLE: COMPUTER USE POLICY PAGE 1 OF 5 EFFECTIVE DATE: 07/2001 REVIEW DATES: 02/2003, 09/2006 REVISION DATES: 03/2005, 03/2008 DISTRIBUTION: All Departments PURPOSE APPROVED BY: Signatures on File Chief
More information4118.35 Personnel POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS AND ELECTRONIC COMMUNICATIONS
4118.35 Personnel POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS AND ELECTRONIC COMMUNICATIONS Computers, computer networks, electronic devices, Internet access, and e-mail are effective
More information5. Users of ITS are the persons described above under Policy Application of the diocese of Springfield in Illinois.
Diocese of Springfield in Illinois Section I General Statement 1. Information Technology Systems (ITS), when properly used, provide timely communication and technological support to help fulfill the mission
More informationPeace Corps Office of the OCIO Information and Information Technology Governance and Compliance Rules of Behavior for General Users
Table of Contents... 1 A. Accountability... 1 B. System Use Notification (Login Banner)... 1 C. Non-... 1 D. System Access... 2 E. User IDs... 2 F. Passwords... 2 G. Electronic Information... 3 H. Agency
More informationOHIO VALLEY EDUCATIONAL COOPERATIVE TECHNOLOGY ACCEPTABLE USE POLICY
OHIO VALLEY EDUCATIONAL COOPERATIVE TECHNOLOGY ACCEPTABLE USE POLICY 03.13211 Referenced by OVEC Policy Manual and OVEC Employee Handbook Version 2.0.0 2/12/2014 Section headings: 1. Introductory paragraph
More informationREGULATION ALLENDALE BOARD OF EDUCATION. PROGRAM R 2361/Page 1 of 7 USE OF COMPUTER NETWORK/COMPUTERS R 2361 USE OF COMPUTER NETWORK/COMPUTERS
R 2361/Page 1 of 7 R 2361 The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes only. The purpose of providing technology
More informationTown of Essex Comprehensive Public Records and Technology Policy
Town of Essex Comprehensive Public Records and Technology Policy Introduction: Public records and the use of technology are inextricably linked in our modern age. As such, this policy covers both topics,
More informationSheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Introduction This Telephone and Computer Information Access Policy (the "Policy") governs
More informationNondiscrimination. 1 of 10
Scope This procedure applies to all College District information technology resource users, including but not limited to administrators, faculty, students, staff, Board members, agents, volunteers, vendors,
More informationELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY
ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY I. ELECTRONIC COMMUNICATION A. PURPOSE To better serve our citizens and give our workforce the best tools to do their jobs, the Common Council of the
More informationR 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES
R 2361/page 1 of 8 R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
More informationHow To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
More informationThe City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance.
1.0 PURPOSE: Internet access to global electronic information sources on the World Wide Web is provided by the City of Battle Creek to assist in obtaining work-related data and technology. The following
More information51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES
Page 1 of 5 Purpose This regulation implements Board policy JS by setting forth specific procedures, requirements and restrictions and conditions governing student use of District Information Technology
More informationHIPAA Security Training Manual
HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,
More informationAcceptable Use Policy - NBN Services
OASIS TELECOM ABN: 31 155 359 541 P: 1300 734 399 F: 03 9011 9644 care@oasistelecom.com.au www.oasistelecom.com.au PO Box 6153, Point Cook, VIC - 3030 Acceptable Use Policy - NBN Services Important Note:
More informationDelaware State University Policy
Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message
More informationEmbedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY
T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...
More informationGeneral Rules of Behavior for Users of DHS Systems and IT Resources that Access, Store, Receive, or Transmit Sensitive Information
General Rules of Behavior for Users of DHS Systems and IT Resources that Access, Store, Receive, or Transmit Sensitive Information The following rules of behavior apply to all Department of Homeland Security
More informationBLOOMFIELD COLLEGE ACCEPTABLE USE POLICY
- 1 BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY Summary of Acceptable Use Policy Bloomfield College provides technology resources to the College Community, including students, faculty, administration, alumni,
More informationGrand Rapids Public Schools
4510-R Computer Network (Cf. 4520) 4510-R Planning and funding for computer networking in the District shall be handled in accord with the District's policy and rules on technology. Supervised Use Teachers
More informationForrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
More informationDEPARTMENT OF MENTAL HEALTH POLICY/PROCEDURE
2 of 10 2.5 Failure to comply with this policy, in whole or in part, if grounds for disciplinary actions, up to and including discharge. ADMINISTRATIVE CONTROL 3.1 The CIO Bureau s Information Technology
More informationU.S. Department of the Interior's Federal Information Systems Security Awareness Online Course
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course Rules of Behavior Before you print your certificate of completion, please read the following Rules of Behavior
More informationBOARD OF EDUCATION POLICY
BOARD OF EDUCATION POLICY IFBGE Internet Safety 7/1/13 It is the policy of the Cobb County School District (District) to: (a) prevent user access over its computer network to, or transmission of inappropriate
More informationRevelstoke Board of Education Policy Manual
Revelstoke Board of Education Policy Manual 3.8 Computer, Internet and BCeSIS Usage and Access This policy shall govern the use of computer equipment, software, the network, e-mail, Internet and BCeSIS
More informationPOLICY NO. 3.14 September 8, 2015 TITLE: INTERNET AND EMAIL USE POLICY
POLICY NO. 3.14 September 8, 2015 TITLE: INTERNET AND EMAIL USE POLICY POLICY STATEMENT: Many of our employees have access to the internet as well as email capabilities. The County recognizes that these
More informationRevised: 6-04, 8-09, 1-12 REGULATION #5420
Adopted: 9-03 PORTAGE PUBLIC SCHOOLS Revised: 6-04, 8-09, 1-12 REGULATION #5420 SUBJECT: Electronic Communications, Internet Safety & Acceptable Use Agreement All PPS electronic information resources are
More informationR3321 ACCEPTABLE USE OF COMPUTER NETWORK(S)/COMPUTERS AND RESOURCES BY TEACHING STAFF MEMBERS
R 3321/Page 1 of 7 R3321 AND RESOURCES BY TEACHING STAFF MEMBERS The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes
More informationSample Policies for Internet Use, Email and Computer Screensavers
Sample Policies for Internet Use, Email and Computer Screensavers In many of its financial management reviews, the Technical Assistance Section has encouraged municipalities to develop and adopt policies
More informationPINE BLUFF POLICE DEPARTMENT POLICY/PROCEDURES MANUAL
PINE BLUFF POLICE DEPARTMENT POLICY/PROCEDURES MANUAL SUBJECT: Computer Security CHAPTER: ADMINISTRATION & PERSONNEL ISSUED By: Chief of Police John Howell POLICY NUMBER 118 ISSUE DATE 02/19/2008 EFFECTIVE
More informationVirginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval
More informationSUPREME COURT OF COLORADO OFFICE OF THE CHIEF JUSTICE
SUPREME COURT OF COLORADO OFFICE OF THE CHIEF JUSTICE Directive Concerning the Colorado Judicial Department Electronic Communications Usage Policy: Technical, Security, And System Management Concerns This
More informationFranciscan University of Steubenville Information Security Policy
Franciscan University of Steubenville Information Security Policy Scope This policy is intended for use by all personnel, contractors, and third parties assisting in the direct implementation, support,
More informationInformation Security Policy
Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems
More informationBERKELEY COLLEGE DATA SECURITY POLICY
BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY TABLE OF CONTENTS Chapter Title Page 1 Introduction 1 2 Definitions 2 3 General Roles and Responsibilities 4 4 Sensitive Data
More informationB. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.
Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER
More informationDistrict Regulation 2361 - ACCEPTABLE USE OF COMPUTER NETWORK/ COMPUTERS AND RESOURCES
District Regulation 2361 - ACCEPTABLE USE OF COMPUTER NETWORK/ COMPUTERS AND RESOURCES Section: Program Date Created: March, 2007 Date Edited: October, 2014 The school district provides computer equipment,
More informationBeaumont Public Library Computer Usage Policies
Beaumont Public Library Computer Usage Policies Information contained in this document is on internet safety, use guidelines, internet filtering, and wireless internet. The Beaumont Public Library, in
More information8.03 Health Insurance Portability and Accountability Act (HIPAA)
Human Resource/Miscellaneous Page 1 of 5 8.03 Health Insurance Portability and Accountability Act (HIPAA) Policy: It is the policy of Licking/Knox Goodwill Industries, Inc., to maintain the privacy of
More informationCORPORATE. Tab Authority Subject Related Policies POLICY STATEMENT PURPOSE
POLICY AND PAGE 1 of 7 OCTOBER 25, 2007 Tab Authority Subject Related Policies Corporate Services Information Technology Services Responsible Computing Corporate IT Guiding Principles Policy, Harassment
More informationAppropriate Use Policy Technology & Information
CLACKAMAS COUNTY EMPLOYMENT POLICY & PRACTICE (EPP) EPP # 59 Implemented: 05/20/10 Clerical Update: Appropriate Use Policy Technology & Information PURPOSE: To establish rules governing use of County information
More informationPROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES
R 2361/Page 1 of 12 R 2361 ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
More informationValmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks The Valmeyer Community Unit School District #3 Board of Education supports the use of the Internet and other computer
More informationBates Technical College. Information Technology Acceptable Use Policy
Bates Technical College Information Technology Acceptable Use Policy Consistent with policy adopted by the Board of Trustees, Bates Technical College, hereinafter referred to as the College, has a commitment
More informationUSE OF INFORMATION TECHNOLOGY FACILITIES
POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised
More informationEMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197
(Return this page to the Executive Staff member or Principal) MEMPHIS CITY SCHOOLS EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 As a condition of using the MCS network, I
More information